IOC Report
Spedizione.vbs

loading gif

Files

File Path
Type
Category
Malicious
Spedizione.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EDVRD.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
ASCII text, with very long lines (22461), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\raw[1].txt
ASCII text, with very long lines (22461), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fe4qbl4.ul1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0lcoy0v.npq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bmncqhkz.zum.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fa2pokle.tzo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4vcqwkf.53t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z3by4mzh.c0k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate-JQCXW.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, System, Archive, ctime=Mon Oct 21 08:17:06 2024, mtime=Mon Oct 21 08:17:06 2024, atime=Mon Oct 21 08:17:06 2024, length=274, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Roaming\WindowsUpdate\PLWAI.tmp
ASCII text, with very long lines (46979), with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Spedizione.vbs"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EDVRD.vbs"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
malicious
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
malicious
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
malicious
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Start Menu\Programs\Startup\EDVRD.vbs"
malicious
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
malicious
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
malicious
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
malicious
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://rentry.co/m7ebw9yf/raw
172.67.75.40
malicious
https://rentry.co/e5cn3isb/raw
172.67.75.40
malicious
http://crl.microsZi
unknown
http://crl.m
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://rentry.co/e5cn3isb/rawrams
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://rentry.co/
unknown
https://rentry.co/e5cn3isb/rawFz
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://rentry.co
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rentry.co
172.67.75.40
malicious
ole.cloudns.ph
80.76.51.209
malicious

IPs

IP
Domain
Country
Malicious
80.76.51.209
ole.cloudns.ph
Bulgaria
malicious
172.67.75.40
rentry.co
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
167E000
stack
page read and write
166EAFF000
stack
page read and write
25555E2D000
heap
page read and write
2555752D000
heap
page read and write
7FF849003000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
210B7D50000
heap
page read and write
1C925203000
heap
page read and write
166E8FE000
stack
page read and write
255565A1000
heap
page read and write
CA58CFF000
stack
page read and write
255535F3000
heap
page read and write
32C1000
trusted library allocation
page read and write
273A09A0000
heap
page read and write
255536AD000
heap
page read and write
25553667000
heap
page read and write
25553801000
heap
page read and write
255565C4000
heap
page read and write
1C92349B000
heap
page read and write
2BEF000
stack
page read and write
1AC3CCF0000
heap
page execute and read and write
164F000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
25557870000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
15F0000
heap
page read and write
25556804000
heap
page read and write
C5BECFE000
stack
page read and write
7FF848D4C000
trusted library allocation
page execute and read and write
1AC4CDB1000
trusted library allocation
page read and write
1C93DF54000
heap
page read and write
1C935550000
trusted library allocation
page read and write
2FB0000
heap
page read and write
E26000
heap
page read and write
273B2941000
trusted library allocation
page read and write
255539F2000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
1C93D6CC000
heap
page read and write
5D3E000
stack
page read and write
210B7DF4000
heap
page read and write
1AC3E7C7000
trusted library allocation
page read and write
273A2939000
heap
page read and write
1AC54ED0000
heap
page read and write
255538E3000
heap
page read and write
5F80000
heap
page execute and read and write
25557577000
heap
page read and write
25557989000
heap
page read and write
1680000
trusted library allocation
page execute and read and write
25553749000
heap
page read and write
25553759000
heap
page read and write
25558890000
remote allocation
page read and write
1AC3AD40000
heap
page read and write
210B7E3C000
heap
page read and write
30D0000
trusted library allocation
page read and write
273A3C43000
trusted library allocation
page read and write
255535C3000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1C925541000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
1634000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
107A000
trusted library allocation
page execute and read and write
CA59E4D000
stack
page read and write
55EE000
stack
page read and write
7FF848E85000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848E5A000
trusted library allocation
page read and write
25553791000
heap
page read and write
96A4C7C000
stack
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
25558890000
remote allocation
page read and write
96A523B000
stack
page read and write
2B99092E000
heap
page read and write
255536D5000
heap
page read and write
7FF848DC0000
trusted library allocation
page execute and read and write
7FF848EF0000
trusted library allocation
page read and write
2B990952000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
1120000
heap
page read and write
58D4000
trusted library allocation
page read and write
273A0A75000
heap
page read and write
2AA0000
trusted library allocation
page read and write
96A5E4E000
stack
page read and write
25558780000
heap
page read and write
1610000
trusted library allocation
page read and write
25557B65000
heap
page read and write
A03A77E000
stack
page read and write
58A0000
trusted library allocation
page read and write
210B7D60000
heap
page read and write
210B7DE8000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
255538CB000
heap
page read and write
C5BEEFE000
stack
page read and write
1682000
heap
page read and write
25553741000
heap
page read and write
255565C4000
heap
page read and write
1AC3D774000
trusted library allocation
page read and write
25553947000
heap
page read and write
255537AD000
heap
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
25553911000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF848CB3000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
273BAA3A000
heap
page read and write
2B990936000
heap
page read and write
7FF848D76000
trusted library allocation
page execute and read and write
7FF849082000
trusted library allocation
page read and write
1C9355B2000
trusted library allocation
page read and write
255537E5000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
1C9254D7000
heap
page execute and read and write
167E000
heap
page read and write
25555C2D000
heap
page read and write
1C92354A000
heap
page read and write
2D08000
trusted library allocation
page read and write
25557544000
heap
page read and write
7FF848E6A000
trusted library allocation
page read and write
1303000
trusted library allocation
page execute and read and write
255538D0000
heap
page read and write
1C9254D0000
heap
page execute and read and write
1AC3D3CA000
trusted library allocation
page read and write
25551668000
heap
page read and write
1AC3ACC0000
heap
page read and write
E69000
heap
page read and write
25558935000
heap
page read and write
7FF848E92000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
1C9266B1000
trusted library allocation
page read and write
25556555000
heap
page read and write
25553911000
heap
page read and write
10F7000
stack
page read and write
255565C4000
heap
page read and write
255516D5000
heap
page read and write
12EA000
trusted library allocation
page execute and read and write
1C9234AE000
heap
page read and write
30C0000
trusted library allocation
page read and write
1216000
heap
page read and write
1030000
heap
page read and write
1AC55420000
trusted library section
page read and write
273A09E0000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
566E000
stack
page read and write
4CDC000
stack
page read and write
210B7E4B000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
2B9908E0000
heap
page read and write
210B7DCF000
heap
page read and write
595E000
stack
page read and write
255535BB000
heap
page read and write
CA5A08D000
stack
page read and write
210B7DD1000
heap
page read and write
1A70000
heap
page read and write
E62000
heap
page read and write
273A2440000
heap
page read and write
16F8000
heap
page read and write
96A4BFE000
stack
page read and write
1AC4D0C0000
trusted library allocation
page read and write
273A43B5000
trusted library allocation
page read and write
2AAB000
trusted library allocation
page execute and read and write
7FF848E61000
trusted library allocation
page read and write
7FF848D96000
trusted library allocation
page execute and read and write
1466000
heap
page read and write
1C923440000
heap
page read and write
1AC3CC6E000
heap
page read and write
13D5000
heap
page read and write
A03A2FD000
stack
page read and write
25557512000
heap
page read and write
A03A8FC000
stack
page read and write
7FF848D86000
trusted library allocation
page execute and read and write
1C9275C1000
trusted library allocation
page read and write
255565C4000
heap
page read and write
7FF848CB2000
trusted library allocation
page read and write
25557588000
heap
page read and write
2B9909D5000
heap
page read and write
25557545000
heap
page read and write
255542E6000
heap
page read and write
25553675000
heap
page read and write
1C92660D000
trusted library allocation
page read and write
96A4A7E000
stack
page read and write
25555F2D000
heap
page read and write
1C93D5D0000
heap
page read and write
2555632E000
heap
page read and write
255537BD000
heap
page read and write
25553761000
heap
page read and write
7FF848D46000
trusted library allocation
page read and write
25557544000
heap
page read and write
1AC3AE13000
heap
page read and write
96A5D8D000
stack
page read and write
10B7000
heap
page read and write
255536C5000
heap
page read and write
1C926FF1000
trusted library allocation
page read and write
A03A073000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
1AC3D9C3000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
2555386D000
heap
page read and write
104E000
stack
page read and write
16AE000
stack
page read and write
255598CD000
heap
page read and write
96A5ECC000
stack
page read and write
2555172D000
heap
page read and write
25553715000
heap
page read and write
7FF848E82000
trusted library allocation
page read and write
273BAE4E000
heap
page read and write
166E2FE000
stack
page read and write
273A2B6C000
trusted library allocation
page read and write
7FF849074000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF8490FB000
trusted library allocation
page read and write
25557D53000
heap
page read and write
210B7DD0000
heap
page read and write
1460000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
25551768000
heap
page read and write
1C926FEF000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
273BADEA000
heap
page read and write
25556801000
heap
page read and write
25553774000
heap
page read and write
C5BF4FB000
stack
page read and write
12EE000
stack
page read and write
210B7DBE000
heap
page read and write
CA58E7E000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1C925360000
heap
page read and write
156E000
stack
page read and write
255538DE000
heap
page read and write
25557B65000
heap
page read and write
210B7DBC000
heap
page read and write
5E34000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848D5C000
trusted library allocation
page execute and read and write
7FF849110000
trusted library allocation
page read and write
1AC3AE70000
trusted library allocation
page read and write
2555622E000
heap
page read and write
3D01000
trusted library allocation
page read and write
2555380C000
heap
page read and write
5C0E000
stack
page read and write
25556CFE000
heap
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
16B2000
heap
page read and write
273B2968000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
A03B40E000
stack
page read and write
25557200000
heap
page read and write
1C925369000
heap
page read and write
255516BB000
heap
page read and write
3120000
heap
page execute and read and write
255565C4000
heap
page read and write
25553789000
heap
page read and write
7FF848E32000
trusted library allocation
page read and write
1AC3CC1A000
heap
page read and write
1AC3CFD1000
trusted library allocation
page read and write
255566C4000
heap
page read and write
7FF8491A7000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
300B000
trusted library allocation
page execute and read and write
273BB444000
heap
page read and write
1700000
trusted library allocation
page read and write
96A4B7E000
stack
page read and write
7FF848E52000
trusted library allocation
page read and write
25557934000
heap
page read and write
210B7DE4000
heap
page read and write
2B99092C000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
7FF848CB4000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
9FB000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
7FF848D56000
trusted library allocation
page read and write
589D000
stack
page read and write
273A33BE000
trusted library allocation
page read and write
1C9270F1000
trusted library allocation
page read and write
12CF000
stack
page read and write
1C93D793000
heap
page read and write
273BAE5D000
heap
page read and write
331E000
stack
page read and write
1510000
heap
page read and write
2BD0000
trusted library allocation
page read and write
255570FE000
heap
page read and write
2BC0000
trusted library allocation
page execute and read and write
210B7DD7000
heap
page read and write
25553947000
heap
page read and write
D67000
stack
page read and write
1C925F71000
trusted library allocation
page read and write
1AC3AF60000
heap
page read and write
273A39E1000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
210B8035000
heap
page read and write
58BB000
trusted library allocation
page read and write
CA59E8F000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
1708000
heap
page read and write
A03A0FE000
stack
page read and write
25557586000
heap
page read and write
2555750E000
heap
page read and write
2555362B000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
255537DD000
heap
page read and write
30B0000
trusted library allocation
page execute and read and write
592D000
stack
page read and write
7FF849190000
trusted library allocation
page read and write
1C923511000
heap
page read and write
1697000
heap
page read and write
210B7DF4000
heap
page read and write
161B000
trusted library allocation
page execute and read and write
1C93DA10000
heap
page read and write
7FF848E72000
trusted library allocation
page read and write
255570FF000
heap
page read and write
2555361B000
heap
page read and write
1C935568000
trusted library allocation
page read and write
C5BF2FE000
stack
page read and write
7FF848E7A000
trusted library allocation
page read and write
255536A5000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
273A0975000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
25553739000
heap
page read and write
EC5000
heap
page read and write
255569FE000
heap
page read and write
14C0000
heap
page read and write
51CE000
stack
page read and write
52FE000
stack
page read and write
255584D0000
heap
page read and write
7FF848CAB000
trusted library allocation
page read and write
1AC3D2C4000
trusted library allocation
page read and write
30E0000
heap
page read and write
2555798A000
heap
page read and write
1AC3EB07000
trusted library allocation
page read and write
58C0000
heap
page read and write
2D01000
trusted library allocation
page read and write
25553911000
heap
page read and write
255565C5000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1C9260F1000
trusted library allocation
page read and write
556E000
stack
page read and write
5950000
heap
page read and write
273B30E7000
trusted library allocation
page read and write
25557BEE000
heap
page read and write
A03A27E000
stack
page read and write
5C69000
trusted library allocation
page read and write
1AC54F11000
heap
page read and write
25556BFD000
heap
page read and write
25557AA7000
heap
page read and write
1C925FBE000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
273A44C1000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
255567C4000
heap
page read and write
1AC3DB00000
trusted library allocation
page read and write
1580000
heap
page read and write
273BA9DE000
heap
page read and write
25557506000
heap
page read and write
255538D1000
heap
page read and write
E40000
heap
page read and write
25553885000
heap
page read and write
273A3A92000
trusted library allocation
page read and write
273BADA0000
heap
page read and write
25555A3C000
heap
page read and write
1AC3DBB6000
trusted library allocation
page read and write
2555656D000
heap
page read and write
2555396E000
heap
page read and write
12D0000
trusted library allocation
page read and write
1633000
trusted library allocation
page execute and read and write
2555377C000
heap
page read and write
188F000
stack
page read and write
1088000
heap
page read and write
25553613000
heap
page read and write
E1E000
stack
page read and write
E75000
heap
page read and write
255516EB000
heap
page read and write
273A0950000
heap
page read and write
273BAB10000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
10B3000
trusted library allocation
page execute and read and write
25555985000
heap
page read and write
210B7E4C000
heap
page read and write
273B2F07000
trusted library allocation
page read and write
2555360B000
heap
page read and write
1AC3AE50000
trusted library allocation
page read and write
1C9275A8000
trusted library allocation
page read and write
1C9253F9000
heap
page read and write
25557508000
heap
page read and write
1AC54EB0000
heap
page read and write
7FF848CA3000
trusted library allocation
page execute and read and write
1054000
trusted library allocation
page read and write
2B990956000
heap
page read and write
7FF848CA2000
trusted library allocation
page read and write
5E3E000
stack
page read and write
5B0F000
stack
page read and write
255598DD000
heap
page read and write
255565A1000
heap
page read and write
255535DB000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
1AC55774000
heap
page read and write
2555751C000
heap
page read and write
255536E5000
heap
page read and write
531B000
trusted library allocation
page read and write
129E000
stack
page read and write
255565C4000
heap
page read and write
1AC3AD9E000
heap
page read and write
273B2D35000
trusted library allocation
page read and write
255537F5000
heap
page read and write
A03A37E000
stack
page read and write
1710000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
2555602D000
heap
page read and write
96A5F4B000
stack
page read and write
5D0E000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
15D3000
trusted library allocation
page execute and read and write
25557789000
heap
page read and write
1210000
heap
page read and write
1AC54F59000
heap
page read and write
5A3E000
stack
page read and write
2B990BF5000
heap
page read and write
7FF849072000
trusted library allocation
page read and write
A03B50C000
stack
page read and write
2555392E000
heap
page read and write
587E000
stack
page read and write
1AC3CDB1000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
1C92351D000
heap
page read and write
31B0000
heap
page execute and read and write
1AC3DBB1000
trusted library allocation
page read and write
273A2920000
heap
page execute and read and write
25557544000
heap
page read and write
25557586000
heap
page read and write
255598ED000
heap
page read and write
522E000
stack
page read and write
5319000
trusted library allocation
page read and write
1AC3CA55000
heap
page read and write
2B0E000
stack
page read and write
1AC3EA3E000
trusted library allocation
page read and write
1AC3DB02000
trusted library allocation
page read and write
5BE0000
heap
page execute and read and write
CA59DCE000
stack
page read and write
25553578000
heap
page read and write
1C925520000
heap
page read and write
1AC55490000
heap
page read and write
25557B82000
heap
page read and write
210B7DE2000
heap
page read and write
EB6000
heap
page read and write
255565C4000
heap
page read and write
1C93D7AC000
heap
page read and write
166E3FE000
stack
page read and write
2B9908C0000
heap
page read and write
2B992370000
heap
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
1480000
heap
page read and write
FCB000
stack
page read and write
2555396E000
heap
page read and write
255536CD000
heap
page read and write
1AC3ADC4000
heap
page read and write
13F5000
heap
page read and write
1690000
heap
page read and write
273B2B0B000
trusted library allocation
page read and write
25556544000
heap
page read and write
5650000
heap
page read and write
1320000
trusted library allocation
page read and write
210B7DD3000
heap
page read and write
1C924D20000
heap
page read and write
210B7DDC000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
255565A1000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
12F0000
trusted library allocation
page execute and read and write
25553901000
heap
page read and write
2B990BF0000
heap
page read and write
1C9253BF000
heap
page read and write
25553779000
heap
page read and write
10B4000
trusted library allocation
page read and write
7FF849084000
trusted library allocation
page read and write
25556531000
heap
page read and write
1C9270F7000
trusted library allocation
page read and write
562E000
stack
page read and write
1C92545A000
heap
page read and write
1C9270EE000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
1C924D90000
heap
page readonly
273A0A4C000
heap
page read and write
E48000
heap
page read and write
CA591FE000
stack
page read and write
1C9275AE000
trusted library allocation
page read and write
25559904000
heap
page read and write
25559944000
heap
page read and write
210B7DEC000
heap
page read and write
1AC4D200000
trusted library allocation
page read and write
255535FB000
heap
page read and write
25553593000
heap
page read and write
1AC3DBB4000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
E7E000
stack
page read and write
10C0000
heap
page read and write
25557586000
heap
page read and write
210B7DDE000
heap
page read and write
1684000
heap
page read and write
7FF848C92000
trusted library allocation
page read and write
2B10000
heap
page read and write
210B8030000
heap
page read and write
58DD000
stack
page read and write
210B7E4C000
heap
page read and write
1320000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
16F0000
trusted library allocation
page execute and read and write
7FF848DD0000
trusted library allocation
page execute and read and write
273A2795000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
255579C2000
heap
page read and write
1040000
trusted library allocation
page read and write
1AC3AE0F000
heap
page read and write
25553917000
heap
page read and write
1C925387000
heap
page read and write
2B990BFE000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
25556FFE000
heap
page read and write
25557587000
heap
page read and write
273A29B5000
trusted library allocation
page read and write
1AC3CD70000
heap
page execute and read and write
5B3E000
stack
page read and write
25557889000
heap
page read and write
255536F5000
heap
page read and write
25556FFF000
heap
page read and write
273A0970000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848E95000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
1520000
heap
page read and write
CA589CF000
stack
page read and write
25557514000
heap
page read and write
144E000
stack
page read and write
25557BEF000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848CA0000
trusted library allocation
page read and write
C5BEAFA000
stack
page read and write
1C923330000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
255566C5000
heap
page read and write
2555396E000
heap
page read and write
608F000
stack
page read and write
255535EB000
heap
page read and write
1C9234D6000
heap
page read and write
CA5A00B000
stack
page read and write
3138000
trusted library allocation
page read and write
1C924EB0000
heap
page read and write
5F7E000
stack
page read and write
273BAAB0000
heap
page execute and read and write
5F30000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
25557501000
heap
page read and write
1AC3CDA0000
heap
page execute and read and write
1AC3AE1B000
heap
page read and write
1AC3AF65000
heap
page read and write
273BAD93000
heap
page read and write
255537D5000
heap
page read and write
255538C8000
heap
page read and write
1C9270F3000
trusted library allocation
page read and write
25553705000
heap
page read and write
EB0000
heap
page read and write
1C9270F5000
trusted library allocation
page read and write
25553875000
heap
page read and write
25557547000
heap
page read and write
1C925370000
heap
page read and write
25553771000
heap
page read and write
166EBFB000
stack
page read and write
5FE0000
heap
page execute and read and write
25553729000
heap
page read and write
25553936000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
25557503000
heap
page read and write
5A2E000
stack
page read and write
210B7DF4000
heap
page read and write
273A3A84000
trusted library allocation
page read and write
7FF8490EB000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
255572FF000
heap
page read and write
1AC4D0B2000
trusted library allocation
page read and write
1720000
heap
page read and write
255598EE000
heap
page read and write
1AC3AD8A000
heap
page read and write
4E3E000
stack
page read and write
30FE000
stack
page read and write
7FF848E4A000
trusted library allocation
page read and write
7DF480AD0000
trusted library allocation
page execute and read and write
2B990957000
heap
page read and write
25555A24000
heap
page read and write
96A4FB9000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
CA58EFE000
stack
page read and write
273BA940000
heap
page read and write
25553885000
heap
page read and write
1347000
trusted library allocation
page execute and read and write
1AC3AD7E000
heap
page read and write
25556AFE000
heap
page read and write
1200000
heap
page read and write
2555170B000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
2555757F000
heap
page read and write
593E000
stack
page read and write
A03A1FF000
stack
page read and write
CF7000
stack
page read and write
25553885000
heap
page read and write
25557689000
heap
page read and write
273A0A38000
heap
page read and write
273BAB06000
heap
page execute and read and write
33D0000
heap
page execute and read and write
1AC3DBA3000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
5A90000
heap
page execute and read and write
25553603000
heap
page read and write
134B000
trusted library allocation
page execute and read and write
7FF848E75000
trusted library allocation
page read and write
25553583000
heap
page read and write
E20000
heap
page read and write
54DD000
stack
page read and write
1660000
heap
page read and write
552E000
stack
page read and write
19D0000
trusted library allocation
page read and write
7FF848E51000
trusted library allocation
page read and write
273A4AEE000
trusted library allocation
page read and write
25557B63000
heap
page read and write
19CC000
stack
page read and write
7FF848E41000
trusted library allocation
page read and write
25553876000
heap
page read and write
7FF849013000
trusted library allocation
page read and write
1313000
trusted library allocation
page read and write
579E000
stack
page read and write
CA59078000
stack
page read and write
255535CB000
heap
page read and write
CA59178000
stack
page read and write
1C93D798000
heap
page read and write
2555370D000
heap
page read and write
A039DDF000
stack
page read and write
273A44C7000
trusted library allocation
page read and write
2555363B000
heap
page read and write
25557400000
heap
page read and write
2B990955000
heap
page read and write
25557588000
heap
page read and write
1630000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7FF848CD0000
trusted library allocation
page read and write
1643000
trusted library allocation
page read and write
682000
unkown
page readonly
2C90000
heap
page read and write
165A000
trusted library allocation
page execute and read and write
128B000
stack
page read and write
273A09F7000
heap
page read and write
273A0ADF000
heap
page read and write
255537A5000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
273B2951000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page execute and read and write
1AC54F51000
heap
page read and write
1698000
heap
page read and write
1AC3CCAA000
heap
page read and write
273BAD90000
heap
page read and write
96A4CFE000
stack
page read and write
1C924D60000
trusted library allocation
page read and write
166E9FE000
stack
page read and write
1C935B06000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
255579C5000
heap
page read and write
1526000
heap
page read and write
12F0000
trusted library allocation
page read and write
255537CD000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
CA592FB000
stack
page read and write
5EE4000
trusted library allocation
page read and write
1AC55770000
heap
page read and write
1358000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
1C923450000
heap
page read and write
1AC3DD62000
trusted library allocation
page read and write
25555B2D000
heap
page read and write
96A5C8E000
stack
page read and write
CA5927E000
stack
page read and write
255535B3000
heap
page read and write
1310000
heap
page execute and read and write
1280000
trusted library allocation
page read and write
15CF000
stack
page read and write
25553769000
heap
page read and write
5240000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
40A000
remote allocation
page execute and read and write
2CFE000
stack
page read and write
1387000
stack
page read and write
168A000
heap
page read and write
255598DB000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
FFE000
stack
page read and write
2B990973000
heap
page read and write
96A4DFD000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
210B7DD6000
heap
page read and write
1C93D738000
heap
page read and write
5C60000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848FE3000
trusted library allocation
page read and write
210B7DCF000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
255516C9000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
255538EB000
heap
page read and write
210B7DF4000
heap
page read and write
273BA948000
heap
page read and write
1AC3CCB0000
heap
page read and write
132A000
trusted library allocation
page execute and read and write
2555176D000
heap
page read and write
273BADC2000
heap
page read and write
255536FD000
heap
page read and write
56AD000
stack
page read and write
2555171C000
heap
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
1340000
heap
page read and write
1C925378000
heap
page read and write
2555359B000
heap
page read and write
13F0000
heap
page read and write
96A52BB000
stack
page read and write
210B7DBE000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
1C924EB5000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
25558780000
heap
page read and write
1AC3CE30000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
CA590F8000
stack
page read and write
25555F2C000
heap
page read and write
4DDE000
stack
page read and write
2CA8000
trusted library allocation
page read and write
255565C4000
heap
page read and write
2555389B000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
25557932000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
255535AB000
heap
page read and write
255516CE000
heap
page read and write
33E1000
trusted library allocation
page read and write
CA58D7E000
stack
page read and write
7FF848C90000
trusted library allocation
page read and write
255565C4000
heap
page read and write
25553799000
heap
page read and write
1C92660F000
trusted library allocation
page read and write
2555367D000
heap
page read and write
1AC3D1FF000
trusted library allocation
page read and write
32BE000
stack
page read and write
160A000
trusted library allocation
page execute and read and write
1330000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
2B990959000
heap
page read and write
96A51BE000
stack
page read and write
1C927584000
trusted library allocation
page read and write
25557586000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
25557539000
heap
page read and write
1C93D7B8000
heap
page read and write
2555365B000
heap
page read and write
1C92539E000
heap
page read and write
1AC55400000
heap
page read and write
1385000
heap
page read and write
2555172D000
heap
page read and write
210B7DB8000
heap
page read and write
25553936000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
96A4AFE000
stack
page read and write
185F000
stack
page read and write
1C93D73F000
heap
page read and write
2555612D000
heap
page read and write
4D3C000
stack
page read and write
210B7DB8000
heap
page read and write
7FF848CBB000
trusted library allocation
page read and write
210B7DBE000
heap
page read and write
1AC3E7E2000
trusted library allocation
page read and write
2555392E000
heap
page read and write
1AC3D1FB000
trusted library allocation
page read and write
A03A6FF000
stack
page read and write
5829000
trusted library allocation
page read and write
2B990900000
heap
page read and write
2555357B000
heap
page read and write
255577F1000
heap
page read and write
25557201000
heap
page read and write
273BADFD000
heap
page read and write
25553911000
heap
page read and write
A03A67D000
stack
page read and write
25557A9F000
heap
page read and write
CA58F7D000
stack
page read and write
25557639000
heap
page read and write
DBB000
stack
page read and write
DD0000
heap
page read and write
42C1000
trusted library allocation
page read and write
1AC3AEC0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
210B7E58000
heap
page read and write
1C935CE7000
trusted library allocation
page read and write
25553936000
heap
page read and write
255565C4000
heap
page read and write
210B7D80000
heap
page read and write
255565C4000
heap
page read and write
5A5F000
stack
page read and write
1C93DA83000
heap
page read and write
1C93D734000
heap
page read and write
25555931000
heap
page read and write
2B99095B000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848CB0000
trusted library allocation
page read and write
255536B5000
heap
page read and write
210B7E3D000
heap
page read and write
255567C5000
heap
page read and write
198F000
stack
page read and write
1AC3AD48000
heap
page read and write
25557544000
heap
page read and write
25553653000
heap
page read and write
255538B8000
heap
page read and write
25559335000
heap
page read and write
7FF848D6C000
trusted library allocation
page execute and read and write
25556DFE000
heap
page read and write
25557531000
heap
page read and write
2BE0000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
25556579000
heap
page read and write
2B9907E0000
heap
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
1AC3AD20000
heap
page read and write
1640000
trusted library allocation
page read and write
1AC3CBC0000
heap
page read and write
2555612E000
heap
page read and write
1AC4D210000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
255536ED000
heap
page read and write
25556589000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
210B7DB8000
heap
page read and write
255516DA000
heap
page read and write
273A23C0000
trusted library allocation
page read and write
CA59D4F000
stack
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
2555396E000
heap
page read and write
2555652E000
heap
page read and write
25553623000
heap
page read and write
2B990936000
heap
page read and write
25557589000
heap
page read and write
1C925340000
heap
page execute and read and write
1C923550000
heap
page read and write
210B7DED000
heap
page read and write
C5BEFFE000
stack
page read and write
255538F2000
heap
page read and write
5320000
heap
page read and write
273BA985000
heap
page read and write
1C925FCB000
trusted library allocation
page read and write
125E000
stack
page read and write
96A4EBF000
stack
page read and write
1C9234D8000
heap
page read and write
A03A577000
stack
page read and write
255565A6000
heap
page read and write
1C935541000
trusted library allocation
page read and write
1AC54F3C000
heap
page read and write
A03A7FF000
stack
page read and write
1C925FB0000
trusted library allocation
page read and write
16E5000
heap
page read and write
96A4E78000
stack
page read and write
1668000
heap
page read and write
25551768000
heap
page read and write
154F000
stack
page read and write
273A2445000
heap
page read and write
255568FC000
heap
page read and write
1AC55170000
heap
page read and write
1AC4CE21000
trusted library allocation
page read and write
1053000
trusted library allocation
page execute and read and write
306E000
stack
page read and write
C5BF1FE000
stack
page read and write
7FF848CA0000
trusted library allocation
page read and write
2555755F000
heap
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
1C92348E000
heap
page read and write
255538C8000
heap
page read and write
25555A24000
heap
page read and write
1AC3D964000
trusted library allocation
page read and write
1C93DBB0000
heap
page read and write
1C9255C2000
trusted library allocation
page read and write
5FBE000
stack
page read and write
A03A17E000
stack
page read and write
16D8000
heap
page read and write
166E5FF000
stack
page read and write
1372000
heap
page read and write
273A2400000
trusted library allocation
page read and write
25553781000
heap
page read and write
210B7DCE000
heap
page read and write
25557572000
heap
page read and write
1AC3CBD0000
heap
page read and write
7FF848E9A000
trusted library allocation
page read and write
25554BD3000
heap
page read and write
12B0000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
210B7DB8000
heap
page read and write
2555877B000
heap
page read and write
210B7DED000
heap
page read and write
210B803E000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
273BAE0E000
heap
page read and write
3CA1000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
FBF000
stack
page read and write
E64000
heap
page read and write
25556DFF000
heap
page read and write
1AC3CC16000
heap
page read and write
1AC54DD0000
heap
page read and write
25551668000
heap
page read and write
1C926611000
trusted library allocation
page read and write
255535D3000
heap
page read and write
255565C4000
heap
page read and write
1C935A30000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
96A513E000
stack
page read and write
210B7DBE000
heap
page read and write
96A50BF000
stack
page read and write
2555642E000
heap
page read and write
128B000
trusted library allocation
page execute and read and write
7FF848CCB000
trusted library allocation
page read and write
255538F2000
heap
page read and write
7FF848CEC000
trusted library allocation
page execute and read and write
5C3F000
stack
page read and write
16C7000
heap
page read and write
1AC3D214000
trusted library allocation
page read and write
2555754F000
heap
page read and write
1AC3CCF6000
heap
page execute and read and write
25553643000
heap
page read and write
210B7DF4000
heap
page read and write
25557525000
heap
page read and write
1C925530000
heap
page execute and read and write
273A33C0000
trusted library allocation
page read and write
25557300000
heap
page read and write
166E6FF000
stack
page read and write
1C923458000
heap
page read and write
25557688000
heap
page read and write
520E000
stack
page read and write
25555A25000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
5DBE000
stack
page read and write
255537C5000
heap
page read and write
12E0000
trusted library allocation
page read and write
2B9926C0000
heap
page read and write
255598CA000
heap
page read and write
16EC000
stack
page read and write
1C926870000
trusted library allocation
page read and write
255538EB000
heap
page read and write
2555358B000
heap
page read and write
2555642D000
heap
page read and write
5E70000
trusted library allocation
page read and write
2B990973000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
25558782000
heap
page read and write
1AC3D4CA000
trusted library allocation
page read and write
255535E3000
heap
page read and write
273BB320000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
10AB000
heap
page read and write
25557520000
heap
page read and write
273A35ED000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
25557870000
heap
page read and write
7FF848CC0000
trusted library allocation
page read and write
25557563000
heap
page read and write
2555753D000
heap
page read and write
255578BD000
heap
page read and write
273A43C1000
trusted library allocation
page read and write
CA58982000
stack
page read and write
273BB440000
heap
page read and write
CA59F8E000
stack
page read and write
1300000
trusted library allocation
page read and write
2555632D000
heap
page read and write
1AC3ABC0000
heap
page read and write
273A2941000
trusted library allocation
page read and write
25558890000
remote allocation
page read and write
7FF848CBD000
trusted library allocation
page execute and read and write
15C0000
trusted library allocation
page read and write
25555FC5000
heap
page read and write
210B7DD5000
heap
page read and write
1C935935000
trusted library allocation
page read and write
1C93DF50000
heap
page read and write
96A503C000
stack
page read and write
68A000
unkown
page readonly
7FF849150000
trusted library allocation
page read and write
680000
unkown
page readonly
273BB360000
heap
page read and write
1AC3EB03000
trusted library allocation
page read and write
1C924D80000
trusted library allocation
page read and write
273A44C9000
trusted library allocation
page read and write
2555368D000
heap
page read and write
7FF848CA4000
trusted library allocation
page read and write
25556CFD000
heap
page read and write
25556BFE000
heap
page read and write
2CA1000
trusted library allocation
page read and write
25557523000
heap
page read and write
57AE000
stack
page read and write
1060000
heap
page read and write
25556EFF000
heap
page read and write
25555B2C000
heap
page read and write
255538EB000
heap
page read and write
585E000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
255536BD000
heap
page read and write
25553900000
heap
page read and write
1C925405000
heap
page read and write
A03A5F8000
stack
page read and write
111C000
heap
page read and write
EB8000
heap
page read and write
575E000
stack
page read and write
273A39E3000
trusted library allocation
page read and write
5905000
trusted library allocation
page read and write
273BAB30000
heap
page read and write
5310000
trusted library allocation
page read and write
273A0A34000
heap
page read and write
255568FD000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
25557ADF000
heap
page read and write
25557529000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
25553731000
heap
page read and write
1000000
heap
page read and write
1C93D74B000
heap
page read and write
255598FF000
heap
page read and write
5C70000
trusted library allocation
page read and write
1C924DD0000
trusted library allocation
page read and write
273A2370000
trusted library allocation
page read and write
2555622D000
heap
page read and write
25553939000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
273A33CC000
trusted library allocation
page read and write
2555750C000
heap
page read and write
210B7DAC000
heap
page read and write
273BAE0B000
heap
page read and write
2B9909C0000
heap
page read and write
25553917000
heap
page read and write
25556599000
heap
page read and write
25556804000
heap
page read and write
1AC3DBB8000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
210B7DB1000
heap
page read and write
160E000
stack
page read and write
2B9909BF000
heap
page read and write
53BE000
stack
page read and write
1379000
heap
page read and write
273A4981000
trusted library allocation
page read and write
12F7000
stack
page read and write
25556539000
heap
page read and write
255516FC000
heap
page read and write
C5BF3FF000
stack
page read and write
25555C2C000
heap
page read and write
210B7DCF000
heap
page read and write
7FF848C94000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
255535A3000
heap
page read and write
1304000
trusted library allocation
page read and write
25559944000
heap
page read and write
273A0A73000
heap
page read and write
1C923410000
heap
page read and write
273A0A03000
heap
page read and write
2555369D000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
1C93570B000
trusted library allocation
page read and write
2AA7000
trusted library allocation
page execute and read and write
7FF848EE0000
trusted library allocation
page read and write
7FF848D0C000
trusted library allocation
page execute and read and write
1AC3AD5F000
heap
page read and write
25553940000
heap
page read and write
3007000
trusted library allocation
page execute and read and write
A03A3FE000
stack
page read and write
255565AB000
heap
page read and write
25557557000
heap
page read and write
1C923445000
heap
page read and write
25553695000
heap
page read and write
572E000
stack
page read and write
273A2380000
heap
page readonly
96A47C3000
stack
page read and write
25553809000
heap
page read and write
12D3000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
210B7DB6000
heap
page read and write
7FF848D66000
trusted library allocation
page read and write
A03A4F9000
stack
page read and write
2555386E000
heap
page read and write
273BB3A0000
heap
page read and write
5E65000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
5F2B000
trusted library allocation
page read and write
1AC3AD82000
heap
page read and write
25553751000
heap
page read and write
25553917000
heap
page read and write
1C926FEB000
trusted library allocation
page read and write
CA59F0E000
stack
page read and write
15E3000
trusted library allocation
page read and write
30BE000
stack
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
255538D5000
heap
page read and write
273BADB9000
heap
page read and write
25557586000
heap
page read and write
273A44C5000
trusted library allocation
page read and write
255538F2000
heap
page read and write
255569FD000
heap
page read and write
25558699000
heap
page read and write
1AC3D1DE000
trusted library allocation
page read and write
25553633000
heap
page read and write
255538C0000
heap
page read and write
96A4D7E000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
1C923464000
heap
page read and write
4131000
trusted library allocation
page read and write
1C93D6B0000
heap
page read and write
1AC4CDBF000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
CA58DFD000
stack
page read and write
1C924E10000
trusted library allocation
page read and write
255538EB000
heap
page read and write
1AC3CCBA000
heap
page read and write
A03B48D000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
166DF4A000
stack
page read and write
7FF848E50000
trusted library allocation
page read and write
1C927399000
trusted library allocation
page read and write
96A5D0E000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
25557523000
heap
page read and write
210B9E40000
heap
page read and write
255516C2000
heap
page read and write
1080000
heap
page read and write
210B8020000
heap
page read and write
5895000
trusted library allocation
page read and write
2555364B000
heap
page read and write
210B7DB1000
heap
page read and write
1310000
trusted library allocation
page read and write
25556561000
heap
page read and write
273A2930000
heap
page read and write
273BB310000
heap
page read and write
10A2000
heap
page read and write
2555602C000
heap
page read and write
2B99095F000
heap
page read and write
255587A0000
heap
page read and write
1C925FCF000
trusted library allocation
page read and write
273A0930000
heap
page read and write
2B990951000
heap
page read and write
1287000
trusted library allocation
page execute and read and write
14A0000
heap
page read and write
25556544000
heap
page read and write
1AC3ACA0000
heap
page read and write
273A34F2000
trusted library allocation
page read and write
25553685000
heap
page read and write
2B990960000
heap
page read and write
2BF0000
heap
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
1AC3AD00000
heap
page read and write
25557518000
heap
page read and write
1AC3E442000
trusted library allocation
page read and write
CA5937B000
stack
page read and write
210B7DD5000
heap
page read and write
7FF8490DB000
trusted library allocation
page read and write
255536DD000
heap
page read and write
1AC3AD25000
heap
page read and write
273A33D0000
trusted library allocation
page read and write
1AC54F15000
heap
page read and write
25553721000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
1C93DA80000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
2555376C000
heap
page read and write
1340000
trusted library allocation
page read and write
1450000
heap
page read and write
E80000
heap
page read and write
19F0000
trusted library allocation
page read and write
25557AA2000
heap
page read and write
7FF848FF3000
trusted library allocation
page read and write
1AC3D3CD000
trusted library allocation
page read and write
273BAB00000
heap
page execute and read and write
273A0920000
heap
page read and write
25553936000
heap
page read and write
55AD000
stack
page read and write
A03A47D000
stack
page read and write
D60000
heap
page read and write
E30000
heap
page read and write
CA58FF9000
stack
page read and write
273A09F0000
heap
page read and write
1C9266BF000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
A03B2CE000
stack
page read and write
2B99092F000
heap
page read and write
C6B000
stack
page read and write
2555877B000
heap
page read and write
1617000
trusted library allocation
page execute and read and write
58E0000
heap
page execute and read and write
1AC3AE90000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
210B7DAD000
heap
page read and write
CA58C7D000
stack
page read and write
172C000
heap
page read and write
19E0000
heap
page read and write
150D000
stack
page read and write
25556549000
heap
page read and write
5CBE000
stack
page read and write
5EBE000
stack
page read and write
A03A87B000
stack
page read and write
7FF848D50000
trusted library allocation
page read and write
25557204000
heap
page read and write
30AC000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
1AC3D1ED000
trusted library allocation
page read and write
255537ED000
heap
page read and write
25553573000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
1C92576D000
trusted library allocation
page read and write
210B7F50000
heap
page read and write
273A476C000
trusted library allocation
page read and write
C5BEBFE000
stack
page read and write
1AC55150000
heap
page read and write
A03B38F000
stack
page read and write
1330000
heap
page read and write
1AC55173000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
96A5DCE000
stack
page read and write
A03B34D000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
51FE000
stack
page read and write
210B7DF4000
heap
page read and write
11CF000
stack
page read and write
127F000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
25555BA5000
heap
page read and write
2B990973000
heap
page read and write
15D4000
trusted library allocation
page read and write
1AC3AE80000
heap
page readonly
96A4F37000
stack
page read and write
518E000
stack
page read and write
255516EB000
heap
page read and write
255537B5000
heap
page read and write
273B29B2000
trusted library allocation
page read and write
273A0A2C000
heap
page read and write
25557CEF000
heap
page read and write
25553900000
heap
page read and write
12F0000
heap
page read and write
273A33B0000
trusted library allocation
page read and write
25553902000
heap
page read and write
1063000
trusted library allocation
page read and write
1C93DA60000
heap
page read and write
1104000
heap
page read and write
273A4957000
trusted library allocation
page read and write
1AC3AF00000
trusted library allocation
page read and write
255538F2000
heap
page read and write
25557523000
heap
page read and write
273B2E30000
trusted library allocation
page read and write
25557544000
heap
page read and write
7FF848C93000
trusted library allocation
page execute and read and write
There are 1265 hidden memdumps, click here to show them.